GCHQ Security Gaffe: Spooks Send Passwords In Plain Text

GCHQ doughnut
0 0 1 Comment

Intelligence agency criticised for rookie error

One of the UK’s core intelligence agencies, GCHQ, has been caught with its pants down, sending passwords in plain text – a fundamental no-no of Internet security.

Evidence that GCHQ is not adequately encrypting or hashing its passwords came to light in a blog post from budding security pro Dan Farrall. Hoping to apply for a job at the agency, Farrall realised he already had an account needed to apply for the role. He had forgotten his password, and asked for a reset. But instead of going through a secure passwords reset process, as is good practice, GCHQ just sent him his login information in a plain text email.

trust security - Shutterstock: © Lightspring

‘Shocking’ from GCHQ

“Pretty shocking in my opinion, so I sent them an email on the 28th of January letting them know about this issue, but have heard nothing back,” Farrall  wrote.

The GCHQ career site may not be run by an internal team, but given it was alerted about the issue some time ago, it will concern many to see nothing has been done.

It is possible that GCHQ is protecting the passwords it holds in its own storage, but sending them in plain text is still bad practice from a major intelligence body that is one of the leading organisations for the promotion of security in the UK.

Another UK giant, Tesco, came in for heavy criticism last year for doing the same thing. It eventually changed its ways after heavy press pressure.

GCHQ said it is in the process of changing systems, although did not say whether it would stop sending passwords in plain text.

“The current applicant tracking system used by GCHQ is a legacy system and we are currently in the process of changing it,” a GCHQ spokesperson said, in a statement emailed to TechWeekEurope. “Only the very small percentage of applicants (who need their accounts reset) are sent a new password. This comes with clear instructions of how to protect their data.”

Are you a security expert? Try our quiz!

  1. I contacted GCHQ a little over a year ago after running a metadata dig on various websites, GCHQ amongst a few others (The Cabinet Office aswell) were all leaking metadata.

    GCHQ showed me UNC paths to local directories (thus showing some internal infrastructure), usernames, applications and versions etc. I still have the output from that scan.

    I contacted the press office who responded with a thankyou and the next day it was resolved, but another rookie mistake.

    Never trust an organisations of secrets, they are all useless, never mind a democracy, we live in a idiocracy.